Runtime Verification: Second international Conference, RV 2011, San Francisco, USA, September 27-30, 2011, Revised Select by Koushik SenRuntime Verification: Second international Conference, RV 2011, San Francisco, USA, September 27-30, 2011, Revised Select by Koushik Sen

Runtime Verification: Second international Conference, RV 2011, San Francisco, USA, September 27-30…

byKoushik Sen

Paperback | May 11, 2012

Pricing and Purchase Info

$119.14 online 
$136.95 list price save 13%
Earn 596 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Runtime Verification, RV 2011, held in San Francisco, USA, in September 2011. The 24 revised full papers presented together with 3 invited papers, 4 tutorials and 4 tool demonstrations were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on parallelism and deadlocks, malware detection, temporal constraints and concurrency bugs, sampling and specification conformance, real-time, software and hardware systems, memory transactions, tools; foundational techniques and multi-valued approaches.
Title:Runtime Verification: Second international Conference, RV 2011, San Francisco, USA, September 27-30…Format:PaperbackDimensions:458 pagesPublished:May 11, 2012Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3642298591

ISBN - 13:9783642298592

Reviews

Table of Contents

Tutorials.-Internal versus External DSLs for Trace Analysis (Extended Abstract).-Predicting Concurrency Failures in the Generalized Execution Traces of x86 Executables.-Runtime Monitoring of Time-Sensitive Systems [Tutorial Supplement] .-Teaching Runtime Verification.-Invited.-Runtime Verification: A Computer Architecture Perspective.-A: Parallelism and Deadlocks Isolating Determinism in Multi-threaded Programs.-Efficiency Optimizations for Implementations of Deadlock Immunity.-Permission Regions for Race-Free Parallelism.-Dynamic Race Detection with LLVM Compiler: Compile-Time Instrumentation for ThreadSanitizer.-B: Malware Detection NORT: Runtime Anomaly-Based Monitoring of Malicious Behavior for Windows.-C: Temporal Constraints and Concurrency Bugs Runtime Verification of LTL-Based Declarative Process Models.-Parametric Identification of Temporal Properties.-Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs.-Coverage Metrics for Saturation-Based and Search-Based Testing of Concurrent Software.-D: Sampling and Specification Conformance Runtime Verification with State Estimation.-Efficient Techniques for Near-Optimal Instrumentation in Time-Triggered Runtime Verification.-CoMA: Conformance Monitoring of Java Programs by Abstract State Machines.-Automated Test-Trace Inspection for Microcontroller Binary Code.-Invited What Is My Program Doing? Program Dynamics in Programmer's Terms.-E: Real-Time Algorithms for Monitoring Real-Time Properties .-F: Software and Hardware Systems Runtime Monitoring of Stochastic Cyber-Physical Systems with Hybrid State .-Combining Time and Frequency Domain Specifications for Periodic Signals .-Runtime Verification for Ultra-Critical Systems.-Runtime Verification of Data-Centric Properties in Service Based Systems.-Invited Cooperative Concurrency for a Multicore World (Extended Abstract) .-G: Memory Transactions Monitoring Data Structures Using Hardware Transactional Memory.-Tools MONPOLY: Monitoring Usage-Control Policies.-MOPBox: A Library Approach to Runtime Verification (Tool Demonstration).-Elarva: A Monitoring Tool for Erlang.-DA-BMC: A Tool Chain Combining Dynamic Analysis and Bounded Model Checking.-H: Foundational Techniques and Multi-valued Approaches I Monitoring Finite State Properties: Algorithmic Approaches and Their Relative Strengths.-Unbounded Symbolic Execution for Program Verification.-Execution Trace Exploration and Analysis Using Ontologies.- I: Foundational Techniques and Multi-valued Approaches II.-Monitoring Realizability.-Runtime Verification of Traces under Recording Uncertainty.-